1 /*
2 * Copyright (c) 2022 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include "apprunningrecordsecond_fuzzer.h"
17
18 #include <cstddef>
19 #include <cstdint>
20
21 #define private public
22 #include "app_running_record.h"
23 #undef private
24
25 #include "ability_record.h"
26 #include "app_running_manager.h"
27 #include "message_parcel.h"
28 #include "securec.h"
29 #include "want.h"
30
31 using namespace OHOS::AAFwk;
32 using namespace OHOS::AppExecFwk;
33
34 namespace OHOS {
35 namespace {
36 constexpr size_t FOO_MAX_LEN = 1024;
37 constexpr size_t U32_AT_SIZE = 4;
38 constexpr uint8_t ENABLE = 2;
39 }
GetU32Data(const char * ptr)40 uint32_t GetU32Data(const char* ptr)
41 {
42 // convert fuzz input data to an integer
43 return (ptr[0] << 24) | (ptr[1] << 16) | (ptr[2] << 8) | ptr[3];
44 }
GetFuzzAbilityToken()45 sptr<Token> GetFuzzAbilityToken()
46 {
47 sptr<Token> token = nullptr;
48 AbilityRequest abilityRequest;
49 abilityRequest.appInfo.bundleName = "com.example.fuzzTest";
50 abilityRequest.abilityInfo.name = "MainAbility";
51 abilityRequest.abilityInfo.type = AbilityType::PAGE;
52 std::shared_ptr<AbilityRecord> abilityRecord = AbilityRecord::CreateAbilityRecord(abilityRequest);
53 if (abilityRecord) {
54 token = abilityRecord->GetToken();
55 }
56 return token;
57 }
DoSomethingInterestingWithMyAPI(const char * data,size_t size)58 bool DoSomethingInterestingWithMyAPI(const char* data, size_t size)
59 {
60 std::shared_ptr<ApplicationInfo> appInfo;
61 int32_t recordId = static_cast<int32_t>(GetU32Data(data));
62 std::string processName(data, size);
63 AppRunningRecord* appRecord = new AppRunningRecord(appInfo, recordId, processName);
64 appRecord->appLifeCycleDeal_ = std::make_shared<AppLifeCycleDeal>();
65 std::shared_ptr<AbilityRunningRecord> ability;
66 appRecord->LaunchAbility(ability);
67 appRecord->AddAbilityStage();
68 std::string bundleName(data, size);
69 appRecord->AddAbilityStageBySpecifiedAbility(bundleName);
70 appRecord->LaunchPendingAbilities();
71 Configuration config;
72 appRecord->LaunchApplication(config);
73 MessageParcel wantParcel;
74 Want *want = nullptr;
75 if (wantParcel.WriteBuffer(data, size)) {
76 want = Want::Unmarshalling(wantParcel);
77 }
78 std::string moduleName(data, size);
79 bool isContinuousTask = *data % ENABLE;
80 appRecord->SetContinuousTaskAppState(isContinuousTask);
81 appRecord->RegisterAppDeathRecipient();
82 sptr<AppDeathRecipient> appDeathRecipient;
83 appRecord->SetAppDeathRecipient(appDeathRecipient);
84 appRecord->RemoveAppDeathRecipient();
85 std::vector<HapModuleInfo> moduleInfos;
86 appRecord->AddModules(appInfo, moduleInfos);
87 std::shared_ptr<AbilityInfo> abilityInfo;
88 sptr<IRemoteObject> token = GetFuzzAbilityToken();
89 HapModuleInfo hapModuleInfo;
90 std::shared_ptr<AAFwk::Want> wantptr;
91 appRecord->AddModule(appInfo, abilityInfo, token, hapModuleInfo, wantptr);
92 appRecord->ScheduleForegroundRunning();
93 appRecord->ScheduleBackgroundRunning();
94 appRecord->AbilityForeground(ability);
95 appRecord->ScheduleProcessSecurityExit();
96 appRecord->ScheduleTrimMemory();
97 int32_t level = static_cast<int32_t>(GetU32Data(data));
98 appRecord->ScheduleMemoryLevel(level);
99 appRecord->LowMemoryWarning();
100 AppExecFwk::AbilityState abilityState = AppExecFwk::AbilityState::ABILITY_STATE_BEGIN;
101 bool isAbility = *data % ENABLE;
102 appRecord->StateChangedNotifyObserver(ability, static_cast<int32_t>(abilityState), isAbility);
103 bool isFocus = *data % ENABLE;
104 appRecord->UpdateAbilityFocusState(token, isFocus);
105 appRecord->UpdateAbilityState(token, abilityState);
106 appRecord->AbilityFocused(ability);
107 appRecord->AbilityUnfocused(ability);
108 appRecord->AbilityBackground(ability);
109 appRecord->PopForegroundingAbilityTokens();
110 uint32_t msg = GetU32Data(data);
111 int64_t timeOut = static_cast<int64_t>(GetU32Data(data));
112 appRecord->SendEventForSpecifiedAbility(msg, timeOut);
113 appRecord->SendEvent(msg, timeOut);
114 std::string stringMsg(data, size);
115 Closure task;
116 appRecord->PostTask(stringMsg, timeOut, task);
117 appRecord->IsLastAbilityRecord(token);
118 appRecord->IsLastPageAbilityRecord(token);
119 appRecord->ScheduleAcceptWant(moduleName);
120 appRecord->UpdateConfiguration(config);
121 std::string description(data, size);
122 appRecord->ScheduleAppCrash(description);
123 appRecord->GetBundleName();
124 appRecord->IsLauncherApp();
125 appRecord->GetRecordId();
126 appRecord->GetName();
127 appRecord->GetProcessName();
128 appRecord->GetAppInfoList();
129 appRecord->GetAbilities();
130 int64_t eventId = static_cast<int64_t>(GetU32Data(data));
131 appRecord->GetAbilityRunningRecord(eventId);
132 appRecord->GetModuleRecordByModuleName(bundleName, moduleName);
133 appRecord->GetModuleRunningRecordByToken(token);
134 appRecord->GetModuleRunningRecordByTerminateLists(token);
135 appRecord->GetAbilityRunningRecordByToken(token);
136 appRecord->GetAbilityByTerminateLists(token);
137 appRecord->GetAllModuleRecord();
138 appRecord->GetPriorityObject();
139 appRecord->GetEventId();
140 appRecord->GetTheModuleInfoNeedToUpdated(bundleName, hapModuleInfo);
141 appRecord->CanRestartResidentProc();
142 std::vector<std::string> bundleNames;
143 appRecord->GetBundleNames(bundleNames);
144 appRecord->IsStartSpecifiedAbility();
145 appRecord->GetSpecifiedWant();
146 appRecord->IsContinuousTask();
147 appRecord->GetFocusFlag();
148 appRecord->GetAppStartTime();
149 std::shared_ptr<ModuleRunningRecord> moduleRecord;
150 appRecord->RemoveModuleRecord(moduleRecord);
151 std::string reason(data, size);
152 appRecord->ForceKillApp(reason);
153 bool isForce = *data % ENABLE;
154 appRecord->TerminateAbility(token, isForce);
155 appRecord->AbilityTerminated(token);
156 appRecord->ScheduleTerminate();
157 appRecord->ApplicationTerminated();
158 appRecord->RemoveTerminateAbilityTimeoutTask(token);
159 sptr<IQuickFixCallback> callback;
160 appRecord->NotifyLoadRepairPatch(bundleName, callback, recordId);
161 appRecord->NotifyHotReloadPage(callback, recordId);
162 appRecord->NotifyUnLoadRepairPatch(bundleName, callback, recordId);
163 return appRecord->IsLauncherApp();
164 }
165 }
166
167 /* Fuzzer entry point */
LLVMFuzzerTestOneInput(const uint8_t * data,size_t size)168 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
169 {
170 /* Run your code on data */
171 if (data == nullptr) {
172 std::cout << "invalid data" << std::endl;
173 return 0;
174 }
175
176 /* Validate the length of size */
177 if (size > OHOS::FOO_MAX_LEN || size < OHOS::U32_AT_SIZE) {
178 return 0;
179 }
180
181 char* ch = (char *)malloc(size + 1);
182 if (ch == nullptr) {
183 std::cout << "malloc failed." << std::endl;
184 return 0;
185 }
186
187 (void)memset_s(ch, size + 1, 0x00, size + 1);
188 if (memcpy_s(ch, size, data, size) != EOK) {
189 std::cout << "copy failed." << std::endl;
190 free(ch);
191 ch = nullptr;
192 return 0;
193 }
194
195 OHOS::DoSomethingInterestingWithMyAPI(ch, size);
196 free(ch);
197 ch = nullptr;
198 return 0;
199 }
200